Skip to content
Threat Feed
high advisory

Windows Defender Protocol Recognition Disabled via Registry Modification

An attacker modifies the Windows Registry to disable Windows Defender protocol recognition, hindering its ability to detect and respond to malware, potentially leading to successful data exfiltration or system compromise.

This threat brief addresses the disabling of Windows Defender’s protocol recognition feature through registry modifications. Attackers may attempt to disable this security feature to evade detection and execute malicious activities without hindrance. This technique involves modifying the “DisableProtocolRecognition” registry setting, preventing Windows Defender from effectively identifying and responding to suspicious network traffic. The successful exploitation of this technique allows attackers to bypass antivirus defenses, increasing the likelihood of successful data exfiltration, lateral movement, and overall system compromise. The reference to the privacy.sexy project indicates that this setting might be disabled as part of a broader privacy-focused configuration, but in the context of an attack, it’s a clear indicator of defense evasion.

Attack Chain

  1. The attacker gains initial access to the target system, potentially through phishing or exploitation of a vulnerability.
  2. The attacker escalates privileges to gain administrative access required to modify the registry.
  3. The attacker uses a command-line tool, such as reg.exe or PowerShell’s Set-ItemProperty, to modify the registry.
  4. The attacker targets the specific registry key: *\Windows Defender\NIS\DisableProtocolRecognition.
  5. The attacker changes the registry_value_data to “0x00000001”, effectively disabling protocol recognition.
  6. Windows Defender’s ability to analyze network traffic based on protocol characteristics is impaired.
  7. The attacker leverages the compromised system to perform malicious activities, such as malware deployment or data exfiltration.
  8. The attacker achieves their final objective of data exfiltration, system compromise, or further propagation within the network.

Impact

Disabling Windows Defender’s protocol recognition significantly reduces the system’s ability to detect and prevent malware infections and data exfiltration attempts. Successful exploitation could lead to complete system compromise, sensitive data theft, and potential disruption of business operations. The number of victims and affected sectors would depend on the scope of the initial compromise and the attacker’s objectives.

Recommendation

  • Enable Sysmon Event ID 13 logging to monitor registry modifications as indicated by the data source requirement in the search implementation notes.
  • Deploy the Sigma rule Detect Defender Protocol Recognition Disabled to your SIEM and tune for your environment.
  • Investigate any alerts generated by the Sigma rule, focusing on systems where suspicious activity has been observed.
  • Use the filter macro defined in the original Splunk search to tune the search and reduce false positives.
  • Review and audit existing Group Policy settings to ensure that Windows Defender protocol recognition is not being intentionally disabled.

Detection coverage 2

Detect Defender Protocol Recognition Disabled

high

Detects modifications to the Windows registry that disable the Windows Defender protocol recognition feature.

sigma tactics: defense_evasion techniques: T1562.001 sources: registry_set, windows

Detect Process Modifying Defender Protocol Recognition

medium

Detects processes that modify the Windows Defender protocol recognition setting.

sigma tactics: defense_evasion techniques: T1562.001 sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →